From secunia security advisory at $URL: Description: The vulnerability is caused due to an assertion error when processing certain search results and can be exploited via a LDAP search request with "attrsOnly" set to true (e.g. ldapsearch -A). Successful exploitation requires a proxy server configured to use both a relay backend and a translucent overlay. The vulnerability is reported in versions prior to 2.4.30. Solution Update to version 2.4.30.
in tree and ready for stabilization. target keywords: alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86
amd64 stable
ppc and ppc64 done
Stable for HPPA.
x86 stable
alpha/arm/ia64/s390/sh/sparc stable
Thanks, everyone. GLSA Vote: yes.
GLSA vote: yes. Adding to existing GLSA draft.
CVE-2012-1164 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1164): slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an LDAP search query with attrsOnly set to true, which causes empty attributes to be returned.
@maintainers, cleanup or mask vulnerable versions, please
Maintainer(s), Thank you for cleanup!
This issue was resolved and addressed in GLSA 201406-36 at http://security.gentoo.org/glsa/glsa-201406-36.xml by GLSA coordinator Yury German (BlueKnight).